Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

The “non-sensitive data” trap: the costly mistake for companies

A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. Thi...
Stefano Gazzella - 01/10/2025 - 15:17

With 50 dollars and physical access to the server, the Cloud goes to hell

A team of researchers has developed a simple hardware tool that challenges the fundamental principles of trusted computing in modern cloud environment...
Redazione RHC - 01/10/2025 - 12:10

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective ...
Daniela Farina - 01/10/2025 - 10:17

Not the children! 8,000 personal data of children from a nursery school are at risk of being published.

A criminal hacker group calling itself Radiant has claimed responsibility for stealing the personal data of over 8,000 children enrolled in daycare ce...
Redazione RHC - 01/10/2025 - 07:58

Programming in crisis: Junior job openings plummet as AI transforms the workplace.

Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily lives and, above all, it is rev...
Redazione RHC - 01/10/2025 - 07:36

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence skills. ...
Redazione RHC - 30/09/2025 - 23:07
1 87 88 89 90 91 256

The “non-sensitive data” trap: the costly mistake for companies

- September 30th, 2025

A wonderfully widespread argument among those who work with personal data is that of underestimating the risks or refusing to address them at all. This is the belief that there's...

Facebook Linkedin X

With 50 dollars and physical access to the server, the Cloud goes to hell

- September 30th, 2025

A team of researchers has developed a simple hardware tool that challenges the fundamental principles of trusted computing in modern cloud environments. Using a device costing less than $50, they...

Facebook Linkedin X

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

- September 30th, 2025

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective mental block....

Facebook Linkedin X

Not the children! 8,000 personal data of children from a nursery school are at risk of being published.

- September 30th, 2025

A criminal hacker group calling itself Radiant has claimed responsibility for stealing the personal data of over 8,000 children enrolled in daycare centers run by London-based Kido International . The...

Facebook Linkedin X

Programming in crisis: Junior job openings plummet as AI transforms the workplace.

- September 30th, 2025

Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily lives and, above all, it is revolutionizing the world of...

Facebook Linkedin X

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

- September 29th, 2025

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence skills. According to representatives from the agency Digital Duke, the...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE